[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/1590953guideproceedingsBook PagePublication PagesmdmConference Proceedingsconference-collections
MDM '09: Proceedings of the 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware
2009 Proceeding
Publisher:
  • IEEE Computer Society
  • 1730 Massachusetts Ave., NW Washington, DC
  • United States
Conference:
May 18 - 20, 2009
ISBN:
978-0-7695-3650-7
Published:
18 May 2009

Reflects downloads up to 02 Mar 2025Bibliometrics
Abstract

No abstract available.

Article
Cover Art
Article
Article
Title Page iii
Article
Article
Reviewers
Article
Keynote 1
Article
Keynote 2
Article
Keynote 3
Article
Invited Seminar
Article
Article
Mining Individual Life Pattern Based on Location History

The increasing pervasiveness of location-acquisition technologies (GPS, GSM networks, etc.) enables people to conveniently log their location history into spatial-temporal data, thus giving rise to the necessity as well as opportunity to discovery ...

Article
A Message Processing Method for Top-k Query for Traffic Reduction in Ad Hoc Networks

In ad hoc networks, to acquire only necessary data items, it is effective that each mobile node retrieves data items using a top-k query, in which data items are ordered by the score of a particular attribute, and the query-issuing mobile node acquires ...

Article
Operator Placement for Snapshot Multi-predicate Queries in Wireless Sensor Networks

This work aims at minimize the cost of answering snapshot multi-predicate queries in high-communication-cost networks. High-communication-cost (HCC) networks is a family of networks where communicating data is very demanding in resources, for example in ...

Article
Privacy-Aware Proximity Based Services

Proximity based services are location based services (LBS) in which the service adaptation depends on the comparison between a given threshold value and the distance between a user and other (possibly moving) entities. While privacy preservation in LBS ...

Article
Efficient Capturing of Environmental Data with Mobile RFID Readers

In this paper we introduce a novel scenario for environmental sensing based on the combination of simple and cheap RFID-based sensors and mobile devices like mobile phones with integrated RFID readers. We envision a system that exploits the availability ...

Article
Finding Probabilistic Nearest Neighbors for Query Objects with Imprecise Locations

A nearest neighbor query is an important notion in spatial databases and moving object databases.In the emerging application fields of moving object technologies, such as mobile sensors and mobile robotics, the location of an object is often imprecise ...

Article
PLOT: Privacy in Location Based Services: An Open-Ended Toolbox

The widespread adoption of Location Based Services (LBSs) coupled with recent advances in location tracking technologies, pose serious concerns to user privacy. As a consequence, privacy preserving approaches have been proposed to protect the location ...

Article
Information-Gradient Based Decentralized Data Management over RFID Tag Clouds

The tasks in the physical environments are mainly information centric processes, such as search and exploration of physical objects. We have developed an informational environment, AURA that supports object searches in the physical world1. The goal of ...

Article
Aggregate Location Monitoring for Wireless Sensor Networks: A Histogram-Based Approach

Location monitoring systems are used to detect human activities and provide monitoring services, e.g., aggregate queries. In this paper, we consider an aggregate location monitoring system where wireless sensor nodes are counting sensors that are only ...

Article
On the Energy Efficiency for Heterogeneous Data Broadcasting

Data broadcast is an advanced technique to realize large scalability and bandwidth utilization in a mobile computing environment. In the heterogeneous data broadcast, the data size is variant with time in multiple broadcast channels. However, ...

Article
Mobile Access to MPEG-7 Based Multimedia Services

Multimedia information systems have been developed into service-ware. With the paradigms of web services, service oriented architectures (SOA), and Web 2.0 widgets, multimedia has become truly ubiquitous. However, interoperability, scalability, ...

Article
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory

Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have been proposed to identify misbehaving nodes. Most of these security schemes ...

Article
Graph Model Based Indoor Tracking

The tracking of the locations of moving objects in large indoor spaces is important, as it enables a range of applications related to, e.g., security and indoor navigation and guidance. This paper presents a graph model based approach to indoor tracking ...

Article
A Concurrency Control Protocol for Continuously Monitoring Moving Objects

The increasing usage of location-aware devices, such as GPS and RFID, has made moving object management an important task. Especially, being demanded in real-world applications, continuous query processing on moving objects has attracted significant ...

Article
SLA-Aware Adaptive On-demand Data Broadcasting in Wireless Environments

In mobile and wireless networks, data broadcasting for popular data items enables the efficient utilization of the limited wireless bandwidth. However, efficient data scheduling schemes are needed to fully exploit the benefits of data broadcasting. This ...

Article
DigestJoin: Exploiting Fast Random Reads for Flash-Based Joins

Flash disks have been an emerging secondary storage media. In particular, there have been portable devices, multimedia players and laptop computers that are configured with no magnetic disks but flash disks.It is envisioned that some RDBMSs will operate ...

Article
Thresholded Range Aggregation in Sensor Networks

The recent advances in wireless sensor technologies (e.g., Mica, Telos motes) enable the economic deployment of lightweight sensors for capturing data from their surrounding environment, serving various monitoring tasks, like forest wildfire alarming ...

Article
ProvidentHider: An Algorithm to Preserve Historical k-Anonymity in LBS

One of the privacy threats recognized in the use of LBS is represented by an adversary having information about the presence of individuals in certain locations, and using this information together with an (anonymous) LBS request to re-identify the ...

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations